Skip to content

Commit

Permalink
Report uninitialized memory exposure in truetype
Browse files Browse the repository at this point in the history
  • Loading branch information
ammaraskar committed Mar 1, 2021
1 parent 1794cae commit b4afb83
Showing 1 changed file with 22 additions and 0 deletions.
22 changes: 22 additions & 0 deletions crates/truetype/RUSTSEC-0000-0000.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
```toml
[advisory]
id = "RUSTSEC-0000-0000"
package = "truetype"
date = "2021-02-17"
url = "https://github.com/bodoni/truetype/issues/11"
categories = ["memory-exposure"]

[versions]
patched = [">= 0.30.1"]
```

# Tape::take_bytes exposes uninitialized memory to a user-provided Read

Affected versions of this crate passed an unininitialized buffer to a
user-provided `Read` instance in `Tape::take_bytes`.

This can result in safe `Read` implementations reading from the uninitialized
buffer leading to undefined behavior.

The flaw was corrected in commit `1f2dc7f37dd` by removing the unsafe block
and zero-initializing the buffer.

0 comments on commit b4afb83

Please sign in to comment.